Exam 4: Information Security Governance and Risk Management

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A quantitative risk analysis does not assign monetary and numeric values to all facets of the risk analysis process.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

False

The data custodian implements the information classification and controls after they are determined.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

After an organization understands its total and residual risk, it must determine how to get rid of the risk.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

False

Commercial organizations usually classify data using five main classification levels: Top Secret, Secret, Confidential, Sensitive but Unclassified, and Unclassified.

(True/False)
4.9/5
(40)

Which risk handling method defines the acceptable risk level the organization can tolerate and reduces the risk to that level?

(Multiple Choice)
4.8/5
(35)

Which threat agent group includes malicious users?

(Multiple Choice)
4.9/5
(33)

Which type of data includes patents, trade secrets, and other information that could seriously affect the government if unauthorized disclosure occurred?

(Multiple Choice)
4.9/5
(34)

What is the probability that a threat agent will exploit vulnerability and the impact if the threat is carried out?

(Multiple Choice)
4.9/5
(33)

Policies are broad and provide the foundation for development of standards, baselines, guidelines, and procedures.

(True/False)
4.7/5
(35)

The first step of a risk assessment is to identify threats and vulnerabilities.

(True/False)
4.8/5
(34)

One of the disadvantages of qualitative risk analysis is that all results are subjective.

(True/False)
4.9/5
(42)

The Zachman Framework is an enterprise architecture framework.

(True/False)
4.8/5
(39)

According to the NIST SP 800-30, what is the last step of a risk assessment?

(Multiple Choice)
4.9/5
(27)

Which calculation uses the formula AV × EF?

(Multiple Choice)
4.9/5
(38)

A countermeasure reduces the potential risk.

(True/False)
4.9/5
(32)

Which role evaluates the security needs of the organization and develops the internal information security governance documents?

(Multiple Choice)
4.8/5
(27)

Tangible assets include intellectual property, data, and organizational reputation.

(True/False)
4.8/5
(37)

What is a baseline?

(Multiple Choice)
4.7/5
(34)

Which of the following is an enterprise security architecture framework?

(Multiple Choice)
4.9/5
(35)

What is the calculation you should use for safeguard value?

(Multiple Choice)
4.8/5
(31)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)